TY - CHAP
T1 - Semantic access control model for RFID-enabled supply chains
AU - Li, Zang
AU - Chu, Chao Hsien
AU - Yao, Wen
PY - 2010/1/1
Y1 - 2010/1/1
N2 - Radio frequency identification (RFID) has been considered as a viable solution for automatic data capture, information sharing and collaboration between enterprise partners. Along with the advantages of sharing information, it comes with the challenges of securing data and trade secret. Access control is an important method for securing data storing and sharing within and across partners in supply chains. In this paper, we propose a concept-level authorization model, aiming at addressing the challenges for securing RFID-enabled supply chains. We analyze the data characteristics and summarize common authorization challenges for RFID data from application perspectives. We propose to use concepts to reduce the size of policy repository and eliminate the structural heterogeneity across the information sources. We then focus on the details of semantic propagation rules that reflect the logical, time and spatial relationships. Other ideas such as policy groups and ontology merging techniques are employed to manage the authorization repository in an efficient manner.
AB - Radio frequency identification (RFID) has been considered as a viable solution for automatic data capture, information sharing and collaboration between enterprise partners. Along with the advantages of sharing information, it comes with the challenges of securing data and trade secret. Access control is an important method for securing data storing and sharing within and across partners in supply chains. In this paper, we propose a concept-level authorization model, aiming at addressing the challenges for securing RFID-enabled supply chains. We analyze the data characteristics and summarize common authorization challenges for RFID data from application perspectives. We propose to use concepts to reduce the size of policy repository and eliminate the structural heterogeneity across the information sources. We then focus on the details of semantic propagation rules that reflect the logical, time and spatial relationships. Other ideas such as policy groups and ontology merging techniques are employed to manage the authorization repository in an efficient manner.
UR - http://www.scopus.com/inward/record.url?scp=84862283128&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84862283128&partnerID=8YFLogxK
U2 - 10.3233/978-1-60750-485-6-95
DO - 10.3233/978-1-60750-485-6-95
M3 - Chapter
AN - SCOPUS:84862283128
SN - 9781607504849
T3 - Cryptology and Information Security Series
SP - 95
EP - 108
BT - Radio Frequency Identification System Security. RFIDsec'10 Asia Workshop Proceedings
PB - IOS Press
ER -